Is it at all possible to remove an Intel CPU from a thinkpad and replace it with something made by AMD? Is there anything made by AMD that's compatible? Or should I just figure out how to get Linux running on my GameCube (PowerPC + ATI graphics)?

no text dumpnot even an archiveTechI'm sick of doing work for shitty OPs.

Security researchers have pinpointed another major security hole in Intel processors, in addition to the security holes in the Intel Management Engine and the Meltdown flaw that hits Intel CPUs uniquely hard. This time, it’s an issue with Intel’s Active Management Technology (AMT), a feature typically reserved for systems that support Intel vPro or workstation platforms with certain Xeon CPUs.The Intel AMT is designed to allow administrators to access and update PCs, even if those PCs are turned off. All they need is an internet connection and a wall socket and they can be updated. That’s a useful tool for large multinational firms with far-flung employees, but it’s also a potential security risk. F-Secure has published information highlighting how easily an attacker with even brief local access can gain full access to an entire machine. Here’s how they describe the problem:

A BIOS password normally prevents an unauthorized user from making low-level changes to a device. However, the essence of this issue is that even when a BIOS password has been set, an attacker does not need it to configure AMT. Not only that, due to insecure defaults in the BIOS and AMT’s BIOS extension (MEBx) configuration, an attacker with physical access can eﬀectively backdoor a machine by provisioning AMT using the default password. The attacker can then access the device remotely, by connecting to the same wireless or wired network as the user. In certain cases, the assailant can also program AMT to connect to their own server, which negates the necessity of being in the same network segment as the victim.

In short, setting a BIOS password won’t help and once someone has access, you can’t kick them out. The researchers note that no other security measures, including local firewalls, BIOS passwords, anti-malware software, or use of a VPN can prevent a compromised system from leaking data, because it’s been compromised outside of the Windows environment, in a separate OS that’s completely shielded from any attempt to inspect or control the data flowing out of or into it.

From here, the possibilities are endless. Even firmware-based malware can be easily uploaded to the system with no chance of detection. And while local access might seem a tough barrier to crack, it’s not as hard as it seems. The changes can be made in under a minute, according to F-Secure. It may not be the kind of attack that gets deployed across thousands of systems on a corporate local network — at least not without additional steps — but it’s exactly the kind of targeted attack a government agency might use. And more to the point, it illustrates that Intel CPUs are once again vulnerable to set of management capabilities that Intel decided to sandbox entirely from the primary operating system.

And more to the point, this is an easily resolved flaw. Even if you think the chance of system penetration via inappropriate local access is minimal, the solution to this problem is to not allow access to the AMT until the proper BIOS password is entered. If a user can’t unlock the BIOS, they shouldn’t be allowed to enter a password for AMT configuration (the default password is, of course, “admin”). Most AMT-capable devices, F-Secure notes, don’t use the feature in the first place. They’re still at risk of local attack, because this attack works against AMT-enabled devices with default passwords. And once inside AMT (reached by hitting Ctrl-P during boot), the attacker can log in using “admin,” input a new remote password, configure AMT to suppress notifications that the laptop has been connected to remotely (thereby preventing users from knowing what’s happened), and also configure it to allow wireless remote management in addition to wired management.

Once this is done, the attacker can connect to the system if he’s on the same local area network or program AMT to enable Client Initiated Remote Access (CIRA), which will connect to the attackers’ servers and avoid any need for local access at all.

Not a great look on a company that’s already being hammered by other security flaws. Intel’s entire rationale for keeping so much of its security infrastructure locked away looks less and less like the principled decision of a company keeping us safe and more like a desperate attempt to cover just how badly it treats security. Because folks, look, this is not a sophisticated attack. This is not some crazy idea. In fact, it’s one of the first things I would expect an attacker to try, if said person had even a basic concept of what functions like AMT and the Intel Management Engine can be configured to do.

It's worth emphasizing that this is a local-only exploit (at least initially) and it can be mitigated by accessing the AMT and changing the password. Chances are nobody here will be directly affected by it, and it continues the merciless nightmare for Intel and especially their management engine, so cheers all around for Holla Forums.

go find the GameCube's broadband modem on eBay, then.Honestly, you should just buy a wii instead. I'm pretty sure the wii itself will be cheaper than the boradband adapter.<muh etherent > wifiYou can just use a usb etherenet adapter which you should be able to find fairly cheap.

Is it at all possible to remove an Intel CPU from a thinkpad and replace it with something made by AMD?If it's newer it probably has a soldered-in CPU, if it's older then you'd need to replace the main board in your device. Basically you'd be better off buying an AMD laptop of your choosing.

Or should I just figure out how to get Linux running on my GameCube (PowerPC + ATI graphics)?PowerPC after late 2005 is vulnerable to Spectre, so having a Gamecube as a desktop would be no better than having an AMD box; in fact since IBM has had problems patching their POWER chips, it might be worse since that seems to be going smoother for Team Red. However, certain G3 and G4 Apple devices are practically immune to these security flaws due to peculiarities in their design, but they are a decade old so be aware of performance tradeoffs going into a transition to those devices. See

Also, as an addendum, while Gamecube is older than the G3's and G4's linked above, it's a 400-500MHz processor and would be difficult to use for daily tasks, if you can even get anything running on it. I was thinking more along the lines of the Wii, which IS modern enough to support a desktop system with some success but would have the post G5 PPC Spectre vulnerability. Either way, PPC consoles are unlikely to have any patches issued for Spectre.

The Intel AMT is designed to allow administrators to access and update PCs, even if those PCs are turned off. All they need is an internet connection and a wall socket and they can be updated. That’s a useful tool for large multinational firms with far-flung employees, but it’s also a potential security risk."Potential security risk." Let's call it what it is: a fucking backdoor.Why is this garbage even sold to home users who don't need or want it? Is it because NSA are the admins now?

Y'all niggers better start boycotting. Don't worry about Intel going out of business though, they still make CPUs for the military. This is just about letting them know you don't like being assraped, speaking to them in the only language they understand: money. BOYCOTT INTEL.

AMT exploitThis is in addition to the one found last May?intel.com/content/www/us/en/architecture-and-technology/intel-amt-vulnerability-announcement.htmlOn May 1, Intel published a security advisory regarding a critical firmware vulnerability in certain systems that utilize Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM) or Intel® Small Business Technology (SBT). The vulnerability could enable a network attacker to remotely gain access to business PCs or devices that use these technologies. Consumer PCs with consumer firmware and data center servers using Intel® Server Platform Services are not affected by this vulnerability.I think not since the article you cite links to the following:business.f-secure.com/intel-amt-security-issueOn May 1, Intel published a security advisory regarding a critical firmware vulnerability in certain systems that utilize Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM) or Intel® Small Business Technology (SBT). The vulnerability could enable a network attacker to remotely gain access to business PCs or devices that use these technologies. Consumer PCs with consumer firmware and data center servers using Intel® Server Platform Services are not affected by this vulnerability.

Not him, but I posted here before that you can easily run Debian (Whiite Linux) on a Homebrew'd Wii with IceWM and even Dillon as the main web browser fairly well as long as you had ample SWAP space, which I just had dedicated to a USB flash drive

Would still never use it as a daily driver though. But it was a nice little novelty nonetheless.

be user of old ThinkPadmaxed out stats for atleast muh maximum performancejust werks<now on suicide watch because old CPUs are said to be slowed down the mostDo I just keep deferring all updates from now on? I don't want 50% performance drops. I'm on Core2Duo at the moment...

My boss. A lot of big orgs use proprietary software that only x86.Sucks a massive dick, but there's not really a convenient way around it.So, on another note, are there any CPU architectures that aren't a steaming file of shit?

Actually, it is my personal computer. I won't get into why - it's a long story.But, regardless, we also FORCE clients to use some of this software in order to communicate with us. I've also had to deal with clients where they've forced me to use software that is OSX only.The fact of the matter is that in the real working world, compromise is necessary. It's hard to escape this. Not only are we in debt to (((them))) by way of usury and fractional reserve banking practises, but they've placed their brackets all around Silicon Valley too.

The general purpose desktop as we know it needs to die. Say good bye to Windows and Linux both. We're going to have to start using the video game console model, everything compartmentalized and specialized and locked down to a strict set of supported hardware so that it can be optimized as much as is humanly possible with absolutely no room for "a complete standalone OS embedded into the CPU for the purpose of remote code execution and spying".

several low functioning autists on Holla Forums boycott IntelIntel lose a couple of thousand in potential salesmilitary, government and large corps still buy IntelThe dent in their profits is going to be undetectable. Indistinguishable from noise.Don't buy Intel because they will fuck you over. But calling it a boycott and acting like it's going to achieve anything on a larger scale is a pipe dream.

By 2020 the plan is to have BIOS removed. So you couldn't even write a self-booting disk/usb stick if you wanted.

The worst home computer architecture won the battle in the 80s. Now it's fully infiltrated and controlled.

It turns out open source software was a red herring. Linux was a distraction. No degree of security or autonomy over a Win10 user. The hardware was fully backdoored long ago. The compilers, including gcc are now nearly fully backdoored. If you're still using x86 for anything but jerking it and checking the weather you're a fool.

No degree of security or autonomy over a Win10 userWrong.If you're still using x86 for anything but jerking itOne of the most intimate and publicly embarrassing, sometimes incriminating information there is. What else am I going to keep secret? My Stallman folder?

It turns out open source software was a red herring. Linux was a distraction.Linuxes were good until 2010 then suddenly went to shit due to systemd, Grub2, touchscreen DE's and other things. KDE and Gnome also went to shit.

No degree of security or autonomy over a Win10 user.Be serious. Admittedly Windows can be hardened better than Linux. At least Windows firewall lets you block specific programs and not just ports for one thing. The 1980s called, they want their Gufw back.

The hardware was fully backdoored long ago.True, proof is Intel ME and similar crap we know of.

The compilers, including gcc are now nearly fully backdoored.For this claim do you have proof? "Nearly fully backdoored", as in "nearly full of shit"? Proof (file, line of code, refusal to patch, disassembled compiler) or it's opinion. I remember that VS2015 has some stupid telemetry crap that it adds to what you build, but that's been found out, fixed in VS2017 and GCC doesn't have that.

Linuxes were good until 2010 then suddenly went to shit due to systemd, Grub2, touchscreen DE's and other things. KDE and Gnome also went to shit.Linux is what, 8 million lines of code not including the user-space?OpenBSD is 4 million, but that includes the user space and X.TempleOS is 100000 lines of code.Forth can be 1000 lines or less, with the ANSI standard dictionary.

Not so fast, in current year Pajeets at MS are personally asking you why you Googled a specific framework and used it in your program instead of using MS's do-alike. There was a thread on this a while back.

Gigabytes of proprietary software is impossible to audit or trust. You are a hypocrite for trusting it but denouncing free software like systemd. You just want to push people to proto-proprietary software like the BSDs or all the way to M$ etc.

You are a hypocrite for trusting it but denouncing free software like systemd. Oh fucking please. Everybody knows systemd is pure cancer by now. It's larger than most historical OS's and subsumes much of their function. It's too big and swiftly-moving to be audited.

Pretending that it's the only thing going on Linux is not going to get you anywhere here kid.

implying systemd is possible to audit or trustimplying the extra freedom by MIT/BSD licenses is a Bad Thing(tm)still no proof of VS2017 adding telemetry to user programs

This was covered here, the Pajeets had a log of what the programmer searched for.Clarify because that's ambiguous. Searched for what, where? Searched the web page (the extension names) or his own open project (the code)?

VS2017 IDE telemetry can be disabled (choose no participation in VS Experience Improvement Program from Help->Send Feedback->Settings) or at worst it can be firewall blocked. Firefox is no better off, check it.

But I wasn't talking about VS2017 telemetry in the IDE however (and I'll laugh in your face when systemd adds telemetry of its own, enabled by default, in addition to leaking DNS to Google). I was talking about covertly adding telemetry stubs to user programs compiled with it, which VS2015 did but VS2017 doesn't do anymore... unless of course you have evidence to the contrary? Which I'd like to see? Pretty please?

Everybody knows systemd is pure cancer by now. It's larger than most historical OS's and subsumes much of their function. It's too big and swiftly-moving to be audited.I have the following conspiracy theory and I'd like your opinion: what if systemd is designed as a secondary kernel and its only purpose is to increase the attack surface on all Linuxes that use it? Because it sure as hell isn't just an init system anymore. It's a high-level kernel now. If its purpose would be just to help user apps interface with Linux that would be an insult to Linux. So naturally I think its real goal is evil.

implying the extra freedom by MIT/BSD licenses is a Bad Thing(tm)The last MINIX convention got cancelled for lack of speakers, despite being inside every single AMT chip Intel-Aviv has sold for the past what, 15 years? This is what cuck licences do to projects.

No, developers are not users. They are two distinct and different states. When you are developing you are not using. When you are using you are not developing. While a developer may at times be a developer and at other times be a user, he is never both at the same time.

No, more like a #2 Phillips screwdriver. A purpose built tool designed to restrict the user without restricting its use. Forget about PCs and say "Hallo" to the special purpose computing appliance. Imagine a painting tablet that only runs a single digital painting application, A technical drawing table that can only run a single CAD application, the IRS tablet that only runs your income tax form, a video cutting station that looks like an old film editing station and only runs a simple video editor, and a video FX station which only runs a selection of video processors, and electronic book that will only display a single ebook format, etc. pp.I don't agree with the post you replied to, that this will spell the death of the generic work station or home computer, but I do see this as a desirable future for consumer computing. It would solve all of the security problems and most of the usability problems with consumer computing. And it would put a clear barrier between "us", the people who actually create shit, and "them", the people who leach off our creations.

We just need more secu-crypto researchers looking for massive exploits.Then blackmail the said companies to remove such exploits otherwise threat them to crash the market by making the exploit public. You may also bluff if you like.This kills the botnetThe problem is they'll make even stronger botnet instead.

Wat? Shit's just gonna get more bloated and full of bugs. Look at the shit languages they're pushing now, like Rust and Go. They're just excuses to write shit code and pretend the language will fix all problems. No you dense fuckers, only writing good, solid, simple code will fix anything. Terry Davis got the fucking message, and nobody else did apparently. So there's gonna be shitloads of botnet and bugs in the future.

Cartridges (ROM)games, softwareCPUCartridges (R/W)operating systemsstorage devicesHub (optional)multi-monitor, multi-networking, multi-channel audio, etc.connect/split peripherals, other hubs and catridgesPeripheral1 (1 as in I/In)keyboard, speakers, wifistorage devices but not recommendedPeripheral0 (0 as in O/Out)HW:screen monitorcartridge and peripheral slot(s)SW:busybox-like with basic network stack - can be a cartridge slot if you want your own custom or hardened network stack or if you want none at all

Cartridges in general are throw-aways. Makes it easier to discard the botnet.cons:theoretically slower than mobo designpower is clusterfuckstandards will be a clusterfuck

only writing good, solid, simple code will fix anything.Yeah, there's too many people out there born in the mid 70s.So there's gonna be shitloads of botnet and bugs in the future.Just immune system at work. Good load off of my mind and x86_NSA_3PLA can go die finally

Why is this garbage even sold to home users who don't need or want it? Is it because NSA are the admins now?

Yes, there is no other reason to add this to consumer CPU's in which 99 percent of the time won't be used, unless the NSA believes you're a journalist that needs to stop publishing information that it doesn't want you to publish.

If you want to know something even more interesting there is a so-called ‘halt and catch fire’ instruction that was discovered inside Intel's' x86 processor. This instruction, executed in ring 3 from an unprivileged process, appears to lock the processor entirely. To rule out kernel bugs, the instruction was tested against three Linux kernels and two Windows kernels, yielding the same results. Kernel debugging with serial I/O and interrupt hooks appeared to corroborate the results. At the time of this paper’s publishing, the vendor has not been provided sufficient time to respond to the issue.

old Thinkpadleft for dead by both Keknovo and driver OEMsvulnerable ME: will never be patchedvulnerable AMT: will never be patchedvulnerable CPU (Meltdown/Spectre/Skyfall/Solace/JamesBond007WTFBBQ): will never be patchedvulnerable WiFi (KRACK): will never be patchedvulnerable Bluetooth (BlueBorne): will never be patchedassraping exploits for all of these will likely be released sooner or later by shadowbrokers or wlvault

The BIOS has a lot of legacy bloat. It should be removed and replaced with something more lightweight.You do realize it's going to be replaced by UEFI (which is orders of magnitude more bloated) and nothing else?

UEFI is orders of magnitude more flexible in the bootstrapping process. Legacy assumptions about bootstrapping is done away allowing any number of features that BIOS backwards compatibility will not allow. It's also faster.

Used Thinkpads are unusually cheap considering their specs and quality, and no more botnet than their contemporaries. They're shit in the ways all computers are shit, but they're pretty good compared to the alternatives.

You do realize it's going to be replaced by UEFI (which is orders of magnitude more bloated) and nothing else?Sadly yes. I don't understand why things have to get slower and more bloated overtime instead of less.

m68k68k was the shit. If Carmack had started to write software for the Amiga instead of PC and if Commodore hadn'tt made all the blunders they in the early 90s, computing history could have played out much different than it did.

A BIOS password normally prevents an unauthorized user from making low-level changes to a device. However, the essence of this issue is that even when a BIOS password has been set, an attacker does not need it to configure AMT. Not only that, due to insecure defaults in the BIOS and AMT’s BIOS extension (MEBx) configuration, an attacker with physical access can eﬀectively backdoor a machine by provisioning AMT using the default password.keyword: physical

in any case AMT is some homo shit that shouldn't even exist, and I knew this long before the skiddies started talking about it

I don't understand why things have to get slower and more bloated overtime instead of less.The same reason make-work exists: to provide an excuse for existing. Without this fake believe purpose in life, many bipedals would die out of sheer boredom.

How exactly would one go about accessing the AMT? I never accessed this shit and recently lost my job so a new MB and CPU is out of the question. My BIOS is incredibly barebones and won't even let me turn off IME which is extremely unfortunate. At least I know what version it is!

Without jumping to conclusion, what do you think the reason for this was? It's a bigger country, more focused on cyber security because they are renown for having many cyber criminals, and obviously an important market to try and hold given their main competitor (AMD) is aggressive in the area already.

Do you think they ordered their alert list based on something like liability, user count, user importance, and/or maybe something else or should conspiracy be assumed (I don't think so just yet)?

Installing Linux on GamecubeUnless you like cutting your teeth on what is essentially a shitty PPC G3-tier CPU, I wouldn't recommend it.

A saner alternative to this Spectre-Meltdown madness is to just get an old pre-2013 Intel Atom laptop/UMPC or Raspberry Pi 3 modded into a laptop. You can get a good netbook for ~$30 USD and a killer UMPC for ~$130. Typing this from pic related running Void Linux.

Wrong. Forth and BASIC are USERLANDS, not complete OS'. The Commodore 64 for example, actually had a level of abstraction between the kernel and BASIC interface, the "KERNAL" and the KERNAL in fact used its own separate ROM that people could bootstrap other interfaces to like JiffyDOS. In overall function however, many consider it closer to a BIOS found in IBM PCs

Frankly that sucks. Your world is completely throw-away. What needs to happen is all general computing devices (which is just about anything electronic now-a-days) must follow open standards or that the hardware must be open or else face a very hefty VAT.

Interestingly enough, the C64 RAM was actually 64K, but many areas of the memory map are occupied by ROM. However the 6502 is smart enough to know that you can't write to ROM, and redirects writes to the ROM area to RAM instead. You can then change the area the VIC][][ chip uses to a ROM-occupied area to use previously unusable area. This can for using the KERNAL area for video memory, for example. Unfortunately this means you cannot read screen memory.

AMD appeared to be justing their own shit all these yearsActually they were doing opposition researchMeanwhile, they gave their engineers all the time in the world to create the perfect CPU to JUST Intel's shitRelease CPU in 2017Intel loses its shitIntel releases rushed 8core cpusAMD then begins leaking Intel design flawsIntel's fw

Where were you when Intel was slowly raped into bankruptcy over a whole year?

Not sure. But this shouldn't happen considering the tense state of China-US relations after that HK guy was detained for spying. I wonder if it has to do with China making their dragoncore processors, or just flat out threatening to fuck into over a la google style.

My relative in the MSS said there wasn't anything that he knew of, so probably just shitty planning on intels part thats gonna get spun into, "Intel help the chinese fuck the US gov over!!!?!?!"

Google 'Dragoncore'All the results are related to Yu-Gi-OhGoogle "Dragoncore processor"All results are related to Qualcomm Snapdragon ARM chipsI guarantee you exactly 0 chipmakers see dragoncore as any kind of threat.

Are you a Chink? Why do I continue to see you shill Loongson processors all over this board?

Computers were a mistake.That's a realization too late to make. If all computers became disfunctional right now, society would immediately collapse with niggers running amuck looting anything there is to loot etc.

It's not a realization, it's just hyperbole. Intel was the mistake, any other choice was better.You don't just fucking pick the worst ever architecture and then say all computers are a mistake. You picked the shit computers, now you got shit. That's how it fucking works.

IBM could have chosen Motorola instead of Intel, but didn't. John Carmack could have been working on Amiga and could have made his groundbraking 90s games for it, but didn't, and they became PC killer apps instead while the Amiga died. Oh well.

The bigger mistake was when Microsoft picked C instead of Pascal or PL/I. Segmentation was created specifically to improve high-level programming languages and the OS environment. The main problems with C are null-terminated strings, the flat memory model, and arrays that suck.

If you want to fix hardware and software, you have to dispel some myths.1. Programming languages are too hard to understand unless they look like C.2. There is no point in replacing C with anything unless it's gigabytes of garbage per second PajeetScript.3. Languages without a GC like Fortran, Pascal, and Ada are not worth learning, so you should use slow PajeetScript which has a runtime written in C.4. All problems can be solved by abstraction and throwing more hardware at it so there is no need to care about the lower levels.

This problem is not permanent unless you want it to be. I read on the Mill forums where he said he would have built a capability architecture but it wouldn't be able to run C programs, and I think that's sad.

The main overhead and complexity in operating systems comes from file I/O. Virtual memory was created to get rid of internal file I/O by treating the entire disk as if it was persistent RAM. That's called a single-level store and it's extremely powerful and scalable. Most of our OSes treat RAM and disk like paper tape. Null-terminated strings come from a paper tape convention. They do the opposite of single-level store. They remove parallelism and random access and make things more sequential.

Shit thread. TL;DR: Motherboard manufacturer allows you to configure parts of the system even if you set BIOS/UEFI password.This is not an Intel flaw. This is an a motherboard firmware flaw. In-fact Intel motherboards don't allow access to the AMT configuration before asking for the password.

The company said the remaining two suits were securities class actions, where the plaintiffs allege that Intel and some of its officers violated securities laws by making statements about products or its internal controls that were later revealed to have been false or misleading.

I wonder how many exploits have been developed and deployed so far? Will we find old malware from before this was a known problem which takes advantage of these issues? I would bet every state-level actor and a bunch of non-state actors are busy as beavers with this right about now.

my taste is better than every one else on this board so im gonna replace threads that i think are stale with threads every one else thought went stale last month.dont do that shit ever again, if you think the topics on the front page are boring, gtfo or better yet come up with something new.

i am not a shill. if i wanted to be subtle i would write a bot to necrobump 2 - 7 threads over the course of a day and leave it running forever to shit up board quality in general. bumping them simultaneously makes it obvious. i'm simply tired of the same shitty threads sticking on the front page. people need to learn to use the catalog."software autism thread""where's terry now thread""is X better thread""rate my DE thread""i know this should be in the sticky but please give me hardware advice thread"why not instead:<"coding thread"<"cool new library thread"<"crypto and how to mine thread"<"Holla Forums worthy news thread"i have created coding and crypto threads before and they get buried too often because nobody checks the catalog.because Holla Forums doesn't code

if you had bumped them slowly it would not have gotten burried, thats now 2 excuses youve made that make no sense, now im even more sure youre a shill. the fact of the matter is that if you dont have anything of substance to add to a thread, you should have no reason to believe that anyone else has anything to add either...

thats why all the threads you bumped are back off the front page already, youre luck the BO is offline, if you didnt notice, nobody else tries to pull the shit that you just did, because theyd be banned in a fucking second.

i wasn't trying to slide threads. only to stir them. if i bumped them slowly but sustained it would shit the entire board up. instead i've triggered you. let that be a lesson to you. i hope you've learned to use the catalog.

theyd be banned in a fucking second.<implying vpn does not existokay sweetie.

youre shilling for canonical, trying to bury the ubuntu thread, keep it up, i personally will keep that thread on the front page all week, your job will be 9x harder than mine, and your shit stinks from a mile away, so even if you evade your ban, it wont be hard to see its you when you come back, you may think im triggered, but this is a game for me, glhf.

The high priest Terry believed that x86_64 was a perfect foundation for the temple of God, but the catastrophic events have shown him that he had been in error for all these years. His hard work has been all in vain.

But I wasn't talking about VS2017 telemetry in the IDE however (and I'll laugh in your face when systemd adds telemetry of its own, enabled by default, in addition to leaking DNS to Google). I was talking about covertly adding telemetry stubs to user programs compiled with it, which VS2015 did but VS2017 doesn't do anymore... unless of course you have evidence to the contrary? Which I'd like to see? Pretty please?

This forced meme is kinda lame. NUL is just an abbreviation in the ASCII table, just as BEL and LF.He was obviously refering to the null byte used to terminate all C language so-called "strings". Prove that you're a human and can parse natural language like one, else we'll just write you off as one of the markov bots that haunts this forsaken place.

effectively, yes. IQ changes based on the average. It's funny, but most naysayers who claim that we aren't headed for an idiocracy-esque future cite that the average IQ is climbing but fail to realize that that is relative to a fixed point. Of course the IQ is climbing, the average is going down, so today's 100 is last decade's 95.

i am not a shill. if i wanted to be subtle i would write a bot to necrobump 2 - 7 threads over the course of a day and leave it running forever to shit up board quality in general.So /pol/ on a daily basis? ineffective.

I'm using Raspian on an overclocked Raspberry PI 3. I'm not claiming x86 has to die, or other nonsense. But Raspi3 is enough for surfing, if you don't open to many tabs. It's not vulnerable to Meltdown and Spectre. Alternative single board computers might even be more secure, and it helps with compartmentalization (don't do all you shit on one computer).

Linuxes were good until 2010 then suddenly went to shit due to systemd, Grub2, touchscreen DE's and other things. KDE and Gnome also went to shit.

Linux is the Kernel. The other mentioned technologies are ok or even good, but you don't need to use them. So what? Ever heard of Distrowatch?

Yes, there is no other reason to add this to consumer CPU's in which 99 percent of the time won't be used, unless the NSA believes you're a journalist that needs to stop publishing information that it doesn't want you to publish.

Cyberwar? Espionage against other countries. Americans tend to forget that they exist, sometimes...

Confirm your age

About Privacy

We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about your use of our site with our advertising and analytics partners.